Signature Based Authentication for Ephemeral Setup Attacks in Vehicular Sensor Networks

Lukasz Krzywiecki, Patryk Koziel, Nisha Panwar

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

In this paper, we focus on the communication security perspective for connected vehicles that can be categorized into: V2V (Vehicle to Vehicle), V2I (Vehicle to Infrastructure-such as with road side units or a cloud) and the internal vehicle network connections. V2V and V2I improve driving safety and comfort through the dissemination of critical warning messages. We propose a scheme resistant to ephemeral key leakage attacks that imposes pre-computation threat with respect to the static secret key. In particular, the pseudorandom generators that are implemented into the hardware are non-verifiable with respect to sustaining the true randomness while choosing ephemeral keys. We present a formal security model in which the adversary has power to inject ephemeral values of her choice to the protocol and still cannot deduce the static secret keys.

Original languageEnglish
Title of host publication2019 IEEE 18th International Symposium on Network Computing and Applications, NCA 2019
EditorsAris Gkoulalas-Divanis, Mirco Marchetti, Dimiter R. Avresky
PublisherInstitute of Electrical and Electronics Engineers
ISBN (Electronic)9781728125220
DOIs
StatePublished - 1 Sep 2019
Externally publishedYes
Event18th IEEE International Symposium on Network Computing and Applications, NCA 2019 - Cambridge, United States
Duration: 26 Sep 201928 Sep 2019

Publication series

Name2019 IEEE 18th International Symposium on Network Computing and Applications, NCA 2019

Conference

Conference18th IEEE International Symposium on Network Computing and Applications, NCA 2019
Country/TerritoryUnited States
CityCambridge
Period26/09/1928/09/19

Keywords

  • Vehicle communication
  • ephemeral secret leakage
  • untrusted device

ASJC Scopus subject areas

  • Information Systems and Management
  • Computer Networks and Communications
  • Computer Science Applications
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'Signature Based Authentication for Ephemeral Setup Attacks in Vehicular Sensor Networks'. Together they form a unique fingerprint.

Cite this